Configuring Cloud Storage for Flow
New Flow accounts are connected to Flow's secure cloud storage bucket to store collection data. To switch to your own bucket, choose a cloud provider and complete the setup steps:
Once you're done, get in touch.
Google Cloud Storage buckets
You'll need to grant Estuary Flow access to your GCS bucket.
-
Create a bucket to use with Flow, if you haven't already.
-
Follow the steps to add a principal to a bucket level policy. As you do so:
-
For the principal, enter
flow-258@helpful-kingdom-273219.iam.gserviceaccount.com
-
Select the
roles/storage.admin
role.
-
Amazon S3 buckets
You'll need to grant Estuary Flow access to your S3 bucket.
-
Create a bucket to use with Flow, if you haven't already.
-
Follow the steps to add a bucket policy, pasting the policy below. The policy below will work for the US Data Plane. If you're on the EU Data Plane, [get in touch]. Be sure to replace
YOUR-S3-BUCKET
with the actual name of your bucket.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "AllowUsersToAccessObjectsUnderPrefix",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::789740162118:user/flow-aws"
},
"Action": [
"s3:GetObject",
"s3:PutObject",
"s3:DeleteObject"
],
"Resource": "arn:aws:s3:::YOUR-S3-BUCKET/*"
},
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::789740162118:user/flow-aws"
},
"Action": "s3:ListBucket",
"Resource": "arn:aws:s3:::YOUR-S3-BUCKET"
},
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::789740162118:user/flow-aws"
},
"Action": "s3:GetBucketPolicy",
"Resource": "arn:aws:s3:::YOUR-S3-BUCKET"
}
]
}
Azure Blob Storage
You'll need to grant Estuary Flow access to your storage account and container. You'll also need to provide some identifying information.
-
Create an Azure Blob Storage container to use with Flow, if you haven't already.
-
Gather the following information. You'll need this when you contact us to complete setup.
-
Your Azure AD tenant ID. You can find this in the Azure Active Directory page.
-
Your Azure Blob Storage account ID. You can find this in the Storage Accounts page.
-
Your Azure Blob Storage container ID. You can find this inside your storage account.
You'll grant Flow access to your storage resources by connecting to Estuary's Azure application.
-
-
Add Estuary's Azure application to your tenant.
-
Grant the application access to your storage account via the
Storage Blob Data Owner
IAM role.-
Inside your storage account's Access Control (IAM) tab, click Add Role Assignment.
-
Search for
Storage Blob Data Owner
and select it. -
On the next page, make sure
User, group, or service principal
is selected, then click + Select Members. -
You must search for the exact name of the application, otherwise it won't show up:
Estuary Storage Mappings Prod
-
Once you've selected the application, finish granting the role.
For more help, see the Azure docs.
-
Add the Bucket
If your bucket is for Google Cloud Storage or AWS S3, you can add it yourself. Once you've finished the above steps, head to "Admin", "Settings" then "Configure Cloud Storage" and enter the relevant information there and we'll start to use your bucket for all data going forward.
If your bucket is for Azure, send support@estuary.dev an email with the name of the storage bucket and any other information you gathered per the steps above. Let us know whether you want to use this storage bucket to for your whole Flow account, or just a specific prefix. We'll be in touch when it's done!